Secondary development implementation method of embedded security and protection monitoring equipment and storage medium

The invention discloses a secondary development implementation method for embedded security monitoring equipment and a storage medium, and the method comprises the following steps: enabling an embedded operating system to run on a hardware CPU of the equipment; enabling the original factory applicat...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: AMANE HIDEAKI, WANG XIAOMIN, SHEN LIANG, XIANG MINMIN, WU HAO
Format: Patent
Sprache:chi ; eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:The invention discloses a secondary development implementation method for embedded security monitoring equipment and a storage medium, and the method comprises the following steps: enabling an embedded operating system to run on a hardware CPU of the equipment; enabling the original factory application program to run in the embedded operating system environment; enabling a Java operation environment transplanted by an original factory to run in the embedded operation system environment; and enabling a program customized by a downstream client to run in the Java running environment. Compared with the prior art, the method has the advantages that the development human input cost of downstream customers is low; the consumption of a Java running environment on a CPU and a memory can be limited during transplantation, so that application programs developed by downstream clients are ensured not to influence the existing functions of the monitoring equipment; the originally developed program can run in new equipment